Author:
Jiang ShengYi,Song Xiaoyu,Wang Hui,Han Jian-Jun,Li Qing-Hua
Subject
Artificial Intelligence,Computer Vision and Pattern Recognition,Signal Processing,Software
Reference18 articles.
1. An intrusion–detection model;Denning;IEEE Trans. Software Eng.,1987
2. Elkan, C., 1999. Results of the KDD’99 Classifier Learning Contest. URL: http://www.cs.ucsd.edu/users/elkan/clresults.html.
3. Anomaly detection over noisy data using learned probability distributions;Eskin;Proc. ICML,2000
4. Eskin, E., Arnold, A., Prerau, M., Portnoy, L., Stolfo, S., 2002. A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data. In: Proc. Data Mining for Security Applications.
5. Harkins, S., He, H., Willams, G.J., Baster, R.A., Outlier detection using replicator neural networks. In: Proc. 4th Int. Conf. on Data Warehousing and Knowledge Discovery, Aixen-Provence, France, 2002, 170–180.
Cited by
95 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献